SHARE
Facebook X Pinterest WhatsApp

Apple iPhone, iPad Security Vulnerability Revealed

BOSTON, Aug 3 (Reuters) – A newly discovered vulnerability in the software that runs Apple Inc’s (NASDAQ:AAPL) iPad and iPhone could allow hackers to enslave the popular mobile devices, three security firms said on Tuesday. The flaw affects Apple’s iOS, which also runs the iPod touch, and could allow hackers to take complete control of […]

Aug 4, 2010
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

BOSTON, Aug 3 (Reuters) – A newly discovered vulnerability in the software that runs Apple Inc’s (NASDAQ:AAPL) iPad and iPhone could allow hackers to enslave the popular mobile devices, three security firms said on Tuesday.

The flaw affects Apple’s iOS, which also runs the iPod touch, and could allow hackers to take complete control of a vulnerable device, according to Symantec Corp (NASDAQ:SYMC) as well as privately held Lookout and Vupen.

Apple spokeswoman Natalie Harrison said the company was aware of the report and is investigating.

The vulnerability in Apple’s iOS is the latest in a series of security bugs identified in mobile devices over the past week. Security experts at a hacking conference last week pointed out several vulnerabilities in Google Inc’s (NASDAQ:GOOG) operating system for mobile phones and tablet PCs.

Mobile devices have become increasingly vulnerable to attack because the software that runs them has gotten far more complex over the past few year, giving the devices many of the same capabilities as personal computers.

"We shouldn’t be surprised to see security bugs happen in very complex software," said Kevin Mahaffey, chief technology officer for mobile security firm Lookout.

Attackers would need to trick a user into visiting a website planted with a tainted PDF document before infecting an iPad tablet or iPhone smartphone.

Mahaffey said that he is not aware of any incidents in which criminals have exploited the bug to gain control of an Apple device, but said the electronics maker has yet to offer a remedy to protect against such attacks.

"Everybody — both good and bad — knows how it works," he said. (Reporting by Jim Finkle; editing by Andre Grenon and Robert MacMillan)
 

Recommended for you...

SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Manny Rivelo on Evolving Channel & How MSPs Can Get Ahead
Victoria Durgin
Aug 20, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.